11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER:
What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009
|
|
|
Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER:
Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006
|
|
|
Examining Identity and Access Management's Function in Healthcare
sponsored by XtelligentMedia Healthcare
EGUIDE:
Identity and access management is a crucial component of any healthcare organization's security strategy.
Posted: 18 Apr 2024 | Published: 18 Apr 2024
|
|
|
Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT:
As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024
|
|
|
How To Set Up An HR Function: The Essential Guide And Checklist
sponsored by Sage
EBOOK:
This comprehensive guide walks through the essential steps to set up an effective HR function, from defining your business objectives to establishing policies and performance management. Download the e-book to learn how to build a people-focused strategy that supports your company's growth.
Posted: 31 Jul 2024 | Published: 07 Aug 2024
|
|
|
Top 10 end-user computing stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.
Posted: 08 Feb 2021 | Published: 24 Dec 2019
|
|
|
Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
SaaS ERP mushrooms during Covid crisis, up to a point
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.
Posted: 08 Feb 2021 | Published: 18 Sep 2020
|
|
|
Focus: Agile DevOps
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Businesses in every industry are finding themselves under pressure to out-innovate their competitors, and push out new products and services to customers at an ever-increasing rate.
Posted: 08 Feb 2021 | Published: 13 Feb 2017
|
|
|
Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER:
As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
DRaas and the key decision points in DR-as-a-service
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 08 Feb 2021 | Published: 25 Jan 2021
|
|
|
Enterprise Strategy Group (ESG): API security
sponsored by Cequence
ESG THOUGHT LEADERSHIP EBOOK:
As API usage grows, security must keep pace. This e-book explores the challenges of securing APIs, including common attacks and their business impacts. Discover the range of capabilities needed to protect APIs across the development lifecycle. Read the Enterprise Strategy Group (ESG) e-book to learn how to build a robust API security program.
Posted: 31 Oct 2024 | Published: 31 Oct 2024
|
|
|
CW APAC: Buyer's guide to SASE
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
Posted: 15 Mar 2023 | Published: 15 Mar 2023
|
|
|
Why FIX Monitoring Is Crucial For Financial Services Organisations
sponsored by ITRS Group Limited
WHITE PAPER:
Much of the capital markets’ critical trade functions pass through FIX systems. A FIX connectivity issue can lead to a breakdown in communication between broker and client, which can bring significant financial and reputational ramifications. Download this white paper to discover what to look for in a best-in-class FIX monitoring solution.
Posted: 23 Feb 2024 | Published: 23 Feb 2024
|
|
|
Driving Productivity and Business Outcomes by Bridging Enterprise-wide Collaboration
sponsored by Atlassian
ESG WHITE PAPER:
Effective cross-functional collaboration is critical for enterprise success, but it's becoming increasingly complex. Adopting a unified project management solution can help align teams, streamline workflows, and improve visibility - leading to greater productivity and business outcomes. Read this Enterprise Strategy Group white paper to learn more.
Posted: 30 Oct 2024 | Published: 01 Nov 2024
|
|
|
AI-Ready Workstations for Power Users
sponsored by Dell Technologies and Intel
ANALYST REPORT:
This 2024 IDC InfoBrief explores how AI-ready workstations can accelerate productivity. Read on to access insights for decision-makers, the C-suite, IT department managers and advanced PC users.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|
|
AI-Ready Workstations for Power Users
sponsored by Dell Technologies and Intel
ANALYST REPORT:
This 2024 IDC InfoBrief explores how AI-ready workstations can accelerate productivity. Read on to access insights for decision-makers, the C-suite, IT department managers and advanced PC users.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|
|
Utilities Leader Gains Cross-Enterprise System for Enhanced Meter Data Management
sponsored by Qualitest Group
CASE STUDY:
A major utility company upgraded its meter data management (MDM) system across three operating companies, deploying a common platform with new functionality. This case study highlights how the company improved billing services for 10 million customers and reduced IT costs by 60%. Read the full case study.
Posted: 18 May 2024 | Published: 18 May 2024
|
|
|
The Quantified Benefits of Fortinet Security Operations Solutions
sponsored by Fortinet, Inc.
ESG ECONOMIC VALIDATION REPORT:
TechTarget’s Enterprise Strategy Group (ESG) research found that 52% of organizations felt that security operations are more difficult today than they were two years ago.
Posted: 23 Mar 2024 | Published: 23 Mar 2024
|
|
|
IT Project: Virtualisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Virtualisation, in all its forms, has dramatically changed the way enterprise datacentres are operated, managed and built over the course of the past decade or so.
Posted: 08 Feb 2021 | Published: 16 Dec 2016
|
|
|
How to Manage SAP User Accounts and Access Rights with Identity Manager
sponsored by One Identity
WHITE PAPER:
Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.
Posted: 05 Jun 2024 | Published: 05 Jun 2024
|
|
|
Computer Weekly – 2 August 2016: Giving fashion a digital makeover
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how one of the UK's biggest mail order retailers is moving to digital. We examine the growing importance of network function virtualisation. And a year after Microsoft turned Lync into Skype for Business, we assess how the unified communications product is faring. Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
Secure Connectivity for Devices and Users at the Network Edge
sponsored by Ericsson
EBOOK:
Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
Posted: 26 Oct 2023 | Published: 26 Oct 2023
|
|
|
Secure Email - Market Quadrant 2024
sponsored by Fortra
ANALYST REPORT:
The Radicati Secure Email Market Quadrant 2024 evaluates leading vendors in the secure email market, including Proofpoint, Mimecast, Symantec, Cisco, and more. Learn how these vendors protect against email threats like phishing, BEC, and malware. Read the full report for a comprehensive analysis.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Multi cloud backup and recovery best practices
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.
Posted: 08 Feb 2021 | Published: 11 Oct 2019
|
|
|
Adobe Commerce Users Get AI Search for Sites
sponsored by Adobe
EGUIDE:
ph
Posted: 25 Oct 2021 | Published: 25 Oct 2021
|
|